Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:15

General

  • Target

    2024-09-05_c798aa2f6262edd1fc11380ffb4c1b69_cryptolocker.exe

  • Size

    49KB

  • MD5

    c798aa2f6262edd1fc11380ffb4c1b69

  • SHA1

    eb83c1f05c11f4ba76c363a478a9c8efdec351c8

  • SHA256

    550a2cddfc1470692dd43c342848e5d8f170037ce24f7626feb2b9d617ec9414

  • SHA512

    161ff635061520d9d0b85c5679d5205cd762646612a5ff1948c92da9899f538a2bb9cf86651985dcaf26df216a2319ad48c2fa161e19216dd8fe9d64a6d75311

  • SSDEEP

    768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6D8jnPx9UnuDLlD+w6:bIDOw9a0Dwo3P1ojvUSD4PInyDk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-05_c798aa2f6262edd1fc11380ffb4c1b69_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-05_c798aa2f6262edd1fc11380ffb4c1b69_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    49KB

    MD5

    93046123aa0482902c67f32039f0384b

    SHA1

    6e5f70526c9108deb80c159b6a24cde3305f6a8d

    SHA256

    f31b42b05502edfdbffa6f230e12e4658cfde5fb5862e68a544c3336ffa5f6a3

    SHA512

    72a4029ccd895f0d45452b07159682ac9c915c93ca4dbcfc1d71ea21112a610462056314626969250b3c5cfa1b4f67808a2cc1839b9c140dd46b512d9c610112

  • memory/2304-0-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2304-1-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2304-8-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2376-15-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB